xref: /freebsd/share/man/man4/crypto.4 (revision 8ecd87a3e7f5503951d37eab034cb330a1c6ec86)
1.\"	$NetBSD: crypto.4,v 1.24 2014/01/27 21:23:59 pgoyette Exp $
2.\"
3.\" Copyright (c) 2008 The NetBSD Foundation, Inc.
4.\" Copyright (c) 2014 The FreeBSD Foundation
5.\" All rights reserved.
6.\"
7.\" Portions of this documentation were written by John-Mark Gurney
8.\" under sponsorship of the FreeBSD Foundation and
9.\" Rubicon Communications, LLC (Netgate).
10.\"
11.\" This code is derived from software contributed to The NetBSD Foundation
12.\" by Coyote Point Systems, Inc.
13.\"
14.\" Redistribution and use in source and binary forms, with or without
15.\" modification, are permitted provided that the following conditions
16.\" are met:
17.\" 1. Redistributions of source code must retain the above copyright
18.\"    notice, this list of conditions and the following disclaimer.
19.\" 2. Redistributions in binary form must reproduce the above copyright
20.\"    notice, this list of conditions and the following disclaimer in the
21.\"    documentation and/or other materials provided with the distribution.
22.\"
23.\" THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
24.\" ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
25.\" TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
26.\" PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
27.\" BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
28.\" CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
29.\" SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
30.\" INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
31.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
32.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
33.\" POSSIBILITY OF SUCH DAMAGE.
34.\"
35.\"
36.\"
37.\" Copyright (c) 2004
38.\"	Jonathan Stone <jonathan@dsg.stanford.edu>. All rights reserved.
39.\"
40.\" Redistribution and use in source and binary forms, with or without
41.\" modification, are permitted provided that the following conditions
42.\" are met:
43.\" 1. Redistributions of source code must retain the above copyright
44.\"    notice, this list of conditions and the following disclaimer.
45.\" 2. Redistributions in binary form must reproduce the above copyright
46.\"    notice, this list of conditions and the following disclaimer in the
47.\"    documentation and/or other materials provided with the distribution.
48.\"
49.\" THIS SOFTWARE IS PROVIDED BY Jonathan Stone AND CONTRIBUTORS ``AS IS'' AND
50.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
51.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
52.\" ARE DISCLAIMED.  IN NO EVENT SHALL Jonathan Stone OR THE VOICES IN HIS HEAD
53.\" BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
54.\" CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
55.\" SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
56.\" INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
57.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
58.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
59.\" THE POSSIBILITY OF SUCH DAMAGE.
60.\"
61.\" $FreeBSD$
62.\"
63.Dd October 19, 2020
64.Dt CRYPTO 4
65.Os
66.Sh NAME
67.Nm crypto ,
68.Nm cryptodev
69.Nd user-mode access to hardware-accelerated cryptography
70.Sh SYNOPSIS
71.Cd device crypto
72.Cd device cryptodev
73.Pp
74.In sys/ioctl.h
75.In sys/time.h
76.In crypto/cryptodev.h
77.Sh DESCRIPTION
78The
79.Nm
80driver gives user-mode applications access to hardware-accelerated
81cryptographic transforms as implemented by the
82.Xr crypto 9
83in-kernel interface.
84.Pp
85The
86.Pa /dev/crypto
87special device provides an
88.Xr ioctl 2
89based interface.
90User-mode applications open the special device and
91then issue
92.Xr ioctl 2
93calls on the descriptor.
94User-mode access to
95.Pa /dev/crypto
96is controlled by two
97.Xr sysctl 8
98variables:
99.Ic kern.userasymcrypto
100and
101.Ic kern.cryptodevallowsoft .
102.Pp
103The
104.Nm
105device provides two distinct modes of operation: one mode for
106symmetric-keyed cryptographic requests and digests, and a second mode for
107both asymmetric-key (public-key/private-key) requests and
108modular arithmetic (for Diffie-Hellman key exchange and other
109cryptographic protocols).
110The two modes are described separately below.
111.Sh DEPRECATION NOTICE
112The asymmetric-key operations supported by this interface will not be
113present in
114.Fx 14.0
115and later.
116.Sh THEORY OF OPERATION
117Regardless of whether symmetric-key or asymmetric-key operations are
118to be performed, use of the device requires a basic series of steps:
119.Bl -enum
120.It
121Open the
122.Pa /dev/crypto
123device.
124.It
125Create a new cryptography file descriptor via
126.Dv CRIOGET
127to use for all subsequent
128.Xr ioctl 2
129commands.
130.It
131Close the
132.Pa /dev/crypto
133device.
134.It
135If any symmetric-keyed cryptographic or digest operations will be performed,
136create a session with
137.Dv CIOCGSESSION .
138Most applications will require at least one symmetric session.
139Since cipher and MAC keys are tied to sessions, many
140applications will require more.
141Asymmetric operations do not use sessions.
142.It
143Submit requests, synchronously with
144.Dv CIOCCRYPT
145(symmetric),
146.Dv CIOCCRYPTAEAD
147(symmetric),
148or
149.Dv CIOCKEY
150(asymmetric).
151.It
152Optionally destroy a session with
153.Dv CIOCFSESSION .
154.It
155Close the cryptography file descriptor with
156.Xr close 2 .
157This will automatically close any remaining sessions associated with the
158file desriptor.
159.El
160.Sh SYMMETRIC-KEY OPERATION
161The symmetric-key operation mode provides a context-based API
162to traditional symmetric-key encryption (or privacy) algorithms,
163or to keyed and unkeyed one-way hash (HMAC and MAC) algorithms.
164The symmetric-key mode also permits encrypt-then-authenticate fused operation,
165where the hardware performs both a privacy algorithm and an integrity-check
166algorithm in a single pass over the data: either a fused
167encrypt/HMAC-generate operation, or a fused HMAC-verify/decrypt operation.
168.Pp
169To use symmetric mode, you must first create a session specifying
170the algorithm(s) and key(s) to use; then issue encrypt or decrypt
171requests against the session.
172.Ss Algorithms
173For a list of supported algorithms, see
174.Xr crypto 7
175and
176.Xr crypto 9 .
177.Ss IOCTL Request Descriptions
178.\"
179.Bl -tag -width CIOCGSESSION
180.\"
181.It Dv CRIOGET Fa int *fd
182Clone the fd argument to
183.Xr ioctl 2 ,
184yielding a new file descriptor for the creation of sessions.
185.\"
186.It Dv CIOCFINDDEV Fa struct crypt_find_op *fop
187.Bd -literal
188struct crypt_find_op {
189    int     crid;       /* driver id + flags */
190    char    name[32];   /* device/driver name */
191};
192
193.Ed
194If
195.Fa crid
196is -1, then find the driver named
197.Fa name
198and return the id in
199.Fa crid .
200If
201.Fa crid
202is not -1, return the name of the driver with
203.Fa crid
204in
205.Fa name .
206In either case, if the driver is not found,
207.Dv ENOENT
208is returned.
209.It Dv CIOCGSESSION Fa struct session_op *sessp
210.Bd -literal
211struct session_op {
212    u_int32_t cipher;	/* e.g. CRYPTO_DES_CBC */
213    u_int32_t mac;	/* e.g. CRYPTO_MD5_HMAC */
214
215    u_int32_t keylen;	/* cipher key */
216    const void *key;
217    int mackeylen;	/* mac key */
218    const void *mackey;
219
220    u_int32_t ses;	/* returns: ses # */
221};
222
223.Ed
224Create a new cryptographic session on a file descriptor for the device;
225that is, a persistent object specific to the chosen
226privacy algorithm, integrity algorithm, and keys specified in
227.Fa sessp .
228The special value 0 for either privacy or integrity
229is reserved to indicate that the indicated operation (privacy or integrity)
230is not desired for this session.
231.Pp
232Multiple sessions may be bound to a single file descriptor.
233The session ID returned in
234.Fa sessp-\*[Gt]ses
235is supplied as a required field in the symmetric-operation structure
236.Fa crypt_op
237for future encryption or hashing requests.
238.\" .Pp
239.\" This implementation will never return a session ID of 0 for a successful
240.\" creation of a session, which is a
241.\" .Nx
242.\" extension.
243.Pp
244For non-zero symmetric-key privacy algorithms, the privacy algorithm
245must be specified in
246.Fa sessp-\*[Gt]cipher ,
247the key length in
248.Fa sessp-\*[Gt]keylen ,
249and the key value in the octets addressed by
250.Fa sessp-\*[Gt]key .
251.Pp
252For keyed one-way hash algorithms, the one-way hash must be specified
253in
254.Fa sessp-\*[Gt]mac ,
255the key length in
256.Fa sessp-\*[Gt]mackey ,
257and the key value in the octets addressed by
258.Fa sessp-\*[Gt]mackeylen .
259.\"
260.Pp
261Support for a specific combination of fused privacy and
262integrity-check algorithms depends on whether the underlying
263hardware supports that combination.
264Not all combinations are supported
265by all hardware, even if the hardware supports each operation as a
266stand-alone non-fused operation.
267.It Dv CIOCGSESSION2 Fa struct session2_op *sessp
268.Bd -literal
269struct session2_op {
270    u_int32_t cipher;	/* e.g. CRYPTO_DES_CBC */
271    u_int32_t mac;	/* e.g. CRYPTO_MD5_HMAC */
272
273    u_int32_t keylen;	/* cipher key */
274    const void *key;
275    int mackeylen;	/* mac key */
276    const void *mackey;
277
278    u_int32_t ses;	/* returns: ses # */
279    int	crid;		/* driver id + flags (rw) */
280    int	pad[4];		/* for future expansion */
281};
282
283.Ed
284This request is similar to CIOGSESSION except that
285.Fa sessp-\*[Gt]crid
286requests either a specific crypto device or a class of devices (software vs
287hardware).
288The
289.Fa sessp-\*[Gt]pad
290field must be initialized to zero.
291.It Dv CIOCCRYPT Fa struct crypt_op *cr_op
292.Bd -literal
293struct crypt_op {
294    u_int32_t ses;
295    u_int16_t op;	/* e.g. COP_ENCRYPT */
296    u_int16_t flags;
297    u_int len;
298    caddr_t src, dst;
299    caddr_t mac;		/* must be large enough for result */
300    caddr_t iv;
301};
302
303.Ed
304Request a symmetric-key (or hash) operation.
305To encrypt, set
306.Fa cr_op-\*[Gt]op
307to
308.Dv COP_ENCRYPT .
309To decrypt, set
310.Fa cr_op-\*[Gt]op
311to
312.Dv COP_DECRYPT .
313The field
314.Fa cr_op-\*[Gt]len
315supplies the length of the input buffer; the fields
316.Fa cr_op-\*[Gt]src ,
317.Fa cr_op-\*[Gt]dst ,
318.Fa cr_op-\*[Gt]mac ,
319.Fa cr_op-\*[Gt]iv
320supply the addresses of the input buffer, output buffer,
321one-way hash, and initialization vector, respectively.
322.Pp
323If a session is using either fused encrypt-then-authenticate or
324an AEAD algorithm,
325decryption operations require the associated hash as an input.
326If the hash is incorrect, the
327operation will fail with
328.Dv EBADMSG
329and the output buffer will remain unchanged.
330.It Dv CIOCCRYPTAEAD Fa struct crypt_aead *cr_aead
331.Bd -literal
332struct crypt_aead {
333    u_int32_t ses;
334    u_int16_t op;	/* e.g. COP_ENCRYPT */
335    u_int16_t flags;
336    u_int len;
337    u_int aadlen;
338    u_int ivlen;
339    caddr_t src, dst;
340    caddr_t aad;
341    caddr_t tag;		/* must be large enough for result */
342    caddr_t iv;
343};
344
345.Ed
346The
347.Dv CIOCCRYPTAEAD
348is similar to the
349.Dv CIOCCRYPT
350but provides additional data in
351.Fa cr_aead-\*[Gt]aad
352to include in the authentication mode.
353.It Dv CIOCFSESSION Fa u_int32_t ses_id
354Destroys the session identified by
355.Fa ses_id .
356.El
357.\"
358.Sh ASYMMETRIC-KEY OPERATION
359.Ss Asymmetric-key algorithms
360Contingent upon hardware support, the following asymmetric
361(public-key/private-key; or key-exchange subroutine) operations may
362also be available:
363.Pp
364.Bl -column "CRK_DH_COMPUTE_KEY" "Input parameter" "Output parameter" -offset indent -compact
365.It Em "Algorithm" Ta "Input parameter" Ta "Output parameter"
366.It Em " " Ta "Count" Ta "Count"
367.It Dv CRK_MOD_EXP Ta 3 Ta 1
368.It Dv CRK_MOD_EXP_CRT Ta 6 Ta 1
369.It Dv CRK_DSA_SIGN Ta 5 Ta 2
370.It Dv CRK_DSA_VERIFY Ta 7 Ta 0
371.It Dv CRK_DH_COMPUTE_KEY Ta 3 Ta 1
372.El
373.Pp
374See below for discussion of the input and output parameter counts.
375.Ss Asymmetric-key commands
376.Bl -tag -width CIOCKEY
377.It Dv CIOCASYMFEAT Fa int *feature_mask
378Returns a bitmask of supported asymmetric-key operations.
379Each of the above-listed asymmetric operations is present
380if and only if the bit position numbered by the code for that operation
381is set.
382For example,
383.Dv CRK_MOD_EXP
384is available if and only if the bit
385.Pq 1 \*[Lt]\*[Lt] Dv CRK_MOD_EXP
386is set.
387.It Dv CIOCKEY Fa struct crypt_kop *kop
388.Bd -literal
389struct crypt_kop {
390    u_int crk_op;		/* e.g. CRK_MOD_EXP */
391    u_int crk_status;		/* return status */
392    u_short crk_iparams;	/* # of input params */
393    u_short crk_oparams;	/* # of output params */
394    u_int crk_pad1;
395    struct crparam crk_param[CRK_MAXPARAM];
396};
397
398/* Bignum parameter, in packed bytes. */
399struct crparam {
400    void * crp_p;
401    u_int crp_nbits;
402};
403
404.Ed
405Performs an asymmetric-key operation from the list above.
406The specific operation is supplied in
407.Fa kop-\*[Gt]crk_op ;
408final status for the operation is returned in
409.Fa kop-\*[Gt]crk_status .
410The number of input arguments and the number of output arguments
411is specified in
412.Fa kop-\*[Gt]crk_iparams
413and
414.Fa kop-\*[Gt]crk_iparams ,
415respectively.
416The field
417.Fa crk_param[]
418must be filled in with exactly
419.Fa kop-\*[Gt]crk_iparams + kop-\*[Gt]crk_oparams
420arguments, each encoded as a
421.Fa struct crparam
422(address, bitlength) pair.
423.Pp
424The semantics of these arguments are currently undocumented.
425.El
426.Sh SEE ALSO
427.Xr aesni 4 ,
428.Xr hifn 4 ,
429.Xr ipsec 4 ,
430.Xr padlock 4 ,
431.Xr safe 4 ,
432.Xr crypto 7 ,
433.Xr geli 8 ,
434.Xr crypto 9
435.Sh HISTORY
436The
437.Nm
438driver first appeared in
439.Ox 3.0 .
440The
441.Nm
442driver was imported to
443.Fx 5.0 .
444.Sh BUGS
445Error checking and reporting is weak.
446.Pp
447The values specified for symmetric-key key sizes to
448.Dv CIOCGSESSION
449must exactly match the values expected by
450.Xr opencrypto 9 .
451The output buffer and MAC buffers supplied to
452.Dv CIOCCRYPT
453must follow whether privacy or integrity algorithms were specified for
454session: if you request a
455.No non- Ns Dv NULL
456algorithm, you must supply a suitably-sized buffer.
457.Pp
458The scheme for passing arguments for asymmetric requests is baroque.
459.Pp
460.Dv CRIOGET
461should not exist.
462It should be possible to use the
463.Dv CIOC Ns \&*
464commands directly on a
465.Pa /dev/crypto
466file descriptor.
467